Google Workspace Automation
PassAudited by VirusTotal on May 11, 2026.
Overview
Type: OpenClaw Skill Name: google-workspace-automation Version: 0.1.0 The `scripts/plan_workspace_automation.py` script is suspicious due to potential arbitrary file read and write vulnerabilities. It accepts an `--input` path, allowing it to read any file accessible to the agent, leading to information disclosure. It also accepts an `--output` path, allowing it to write the generated automation plan to arbitrary locations, which could overwrite sensitive files. While the script's core functionality is legitimate (planning automation), these capabilities, if exploited by an attacker controlling the arguments, pose significant risks without clear malicious intent within the script itself.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If the generated scopes are used as-is, an automation may receive broad access to Gmail, Drive, Sheets, Calendar, or Docs data.
The planner maps selected services to broad OAuth scopes. It does not use credentials itself, but a user implementing the generated plan could grant wider Google Workspace access than necessary for a specific action.
"drive": "https://www.googleapis.com/auth/drive", "sheets": "https://www.googleapis.com/auth/spreadsheets", "calendar": "https://www.googleapis.com/auth/calendar"
Before implementing a generated plan, compare each suggested scope against Google's narrower scopes and grant only the minimum needed for the exact actions.
